The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we explore security considerations on context-aware workflow systems. We also present the workflow-aware context-role based access control (WCRBAC) model that is a new access control model suitable for context-aware workflow systems. The WCRBAC model enables security administrator to configure authorization policy considering both the security-related context information and the workflow-related...
The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches to location-aware authentication, including the notion of context-based flexible authentication policies, and to location-aware access control, with focus on the GEO-RBAC model. Throughout the discussion, the paper identifies...
Delegation is a key facility in dynamic, distributed and collaborative environments like Grids and enables an effective use of a wide range of dynamic applications. Traditional delegation frameworks approach a top-down model of delegation for delegating rights from a superior to a subordinate in advance before a delegate starts off a delegated task. However, a top-down model of delegation cannot meet...
In recent years, radio frequency identification (RFID) technology has been developing rapidly worldwide due to its convenience and efficiency. However, the security issues cannot be ignored when enterprise adopts RFID technology. It needs to take into consideration of the suitable access control mechanisms for RFID. The traditional role-based access control model (RBAC) is not robust enough to deploy...
Web service is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity and highly dynamic nature. A key challenge in Web service security is the design of effective access control schemas. However, traditional role-based access control (RBAC) model can not meet the dynamic and context sensitivity features of Web service demands. In this...
In order to overcome the limitations in traditional access control models such as identity-based access control and meet the access requirements in distributed systems, we propose a Trust and Context based Access Control model called TCAC, it extends the traditional RBAC (role based access control) model with the notion of trust and context. Role assignment in TCAC is based on the trustworthiness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.